CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
CPO Magazine - News, Insights and Resources for Data Protection, Privacy and Cyber Security Leaders
  • Home
  • News
  • Insights
  • Resources
Home
Hacking
Latest
  • Latest
  • Oldest
  • Random
  • A to Z

Hacking

Dripping water tap showing remote access hack affecting water supply critical infrastructure
Cyber SecurityNews

Attacker Gains Remote Access To a Florida City’s Water Supply, Attempts To Poison It; Is This an Emerging Widespread Threat?

February 15, 2021
Florida city of Oldsmar recently experienced a big scare as a hacker was able to penetrate the water treatment plant via remote access software. The hacker then attempted to poison the city's water supply.
Read More
Log in to Twitter on smartphone screen showing Twitter hack
Cyber SecurityNews

Twitter Hack of High-Profile Accounts Raises a Lot of Questions, But Most Have Yet to Be Answered

July 28, 2020
Twitter hack of high-profile accounts a result of employees tricked into giving up access to support tools that led to compromised accounts posting Bitcoin doubling scam.
Read More
Woman with high tech smart glasses showing how movies can help you understand data privacy and hacking
Cyber SecurityInsights

Movies That Can Help You Understand Data Privacy and Hacking

August 29, 2019
Movies are not that far off from reality if you consider how these 6 films help you understand data privacy and hacking in a world of technology imagined by directors and story writers.
Read More
Hacker working on computer showing new wave of hacking through AI-powered malware, smart phishing and open source attacks
Cyber SecurityInsights

AI-Powered Malware, Smart Phishing and Open Source Attacks, Oh My! The New Wave of Hacking in 2019 and How to Prevent.

May 2, 2019
The IT security industry is facing a new wave of hacking through smart technology, machine learning, and artificial intelligence where hackers will unleash unethical tactics to target and manipulate individuals and organizations.
Read More

Latest

Cisco logo on a wall showing network breach due to voice phishing and MFA fatigue

Cisco Network Breach Traced Back To Compromised Personal Google Account; Sophisticated Attacker Used Combination of Voice Phishing and MFA Fatigue

Empty control center showing cybersecurity workforce gap and DevSecOps divide

Stop Fretting About Hiring Security Specialists

Digital pictures on blurry dark background showing FTC rules on consumer data and commercial surveillance

Proposed FTC Rules Address Commercial Surveillance, Represent Seismic Shift in Handling of Consumer Data

Man using magnifying glass showing SOC 2 for data protection

Want To Turn Your Data Protection Practices Into a Competitive Advantage? Get SOC 2 Compliant

- Advertisement -

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use

Stay Updated

CPO Magazine

News, insights and resources for data protection, privacy and cyber security professionals.

Learn More

About
Contact
Our Advertising
Privacy Policy
Cookie Policy
Terms of Use
Do Not Sell My Data

Stay Updated

Follow Us

© 2022 Rezonen Pte. Ltd.
CPO Magazine - News, Insights and Resources for Data Privacy, Protection and Cybersecurity Leaders
  • Home
  • News
  • Insights
  • Resources
    Start typing to see results or hit ESC to close
    U.S. Data Breach Regulations EU GDPR Facebook
    See all results